Logrotate on mounted partition

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have a procmail recipe which writes a copy of every mail I receive
(just because I'm paranoid it doesn't mean they aren't out to get me!)
to a backup area on my /dev/sda9 partition, mounted as
/mnt/backup/ by fstab. (It is an ext3 partition).

Back in March 2008 when I was on F8 Stephen Smalley kindly helped me to
prevent the hundreds of avcs by suggesting the following:

semanage fcontext -a -t mail_spool_t "/mnt/backup(/.*)?"
restorecon -v -R /mnt/backup

This worked perfectly. It also held true throughout my time with F9. I
have now upgraded to F11 (I skipped F10) and it still kind of works. I
get an avc when logrotate tries to access these files.

The strange thing is this didn't happen under F8 or F9.

Is there an elegant solution to this problem or should I write a policy
module?

This is what audit2allow proposes:

module rawmail 1.0;

require {
	type mail_spool_t;
	type logrotate_t;
	class file getattr;
}

#============= logrotate_t ==============
allow logrotate_t mail_spool_t:file getattr;


The full avc is below.

Many thanks for all your help....

Mark



Summary
SELinux is preventing logrotate (logrotate_t) "getattr" mail_spool_t. 
Detailed Description
[SELinux is in permissive mode, the operation would have been denied but
was permitted due to permissive mode.]

SELinux denied access requested by logrotate. It is not expected that
this access is required by logrotate and this access may signal an
intrusion attempt. It is also possible that the specific version or
configuration of the application is causing it to require additional
access. 



Allowing Access
You can generate a local policy module to allow this access - see FAQ Or
you can disable SELinux protection altogether. Disabling SELinux
protection is not recommended. Please file a bug report against this
package. 
Additional Information


Source Context:  
system_u:system_r:logrotate_t:s0-s0:c0.c1023
Target Context:  
system_u:object_r:mail_spool_t:s0
Target Objects:  
/mnt/backup/mail/rawmail [ file ]
Source:  
logrotate
Source Path:  
/usr/sbin/logrotate
Port:  
<Unknown>
Host:  
troodos.org.uk
Source RPM Packages:  
logrotate-3.7.8-2.fc11
Target RPM Packages:  


Policy RPM:  
selinux-policy-3.6.12-72.fc11
Selinux Enabled:  
True
Policy Type:  
targeted
MLS Enabled:  
True
Enforcing Mode:  
Permissive
Plugin Name:  
catchall
Host Name:  
mydomain
Platform:  
Linux mydomain
2.6.29.6-217.2.3.fc11.i686.PAE #1
SMP Wed Jul 29 16:05:22 EDT 2009
i686 i686
Alert Count:  
3
First Seen:  
Thu Aug 13 03:45:40 2009
Last Seen:  
Sat Aug 15 03:26:41 2009
Local ID:  
3a8c20b3-ff25-43ea-8214-bd926c28215b
Line Numbers:  



Raw Audit Messages :

node=mydomain type=AVC msg=audit(1250303201.472:2436): avc: denied
{ getattr } for pid=15100 comm="logrotate"
path="/mnt/backup/mail/rawmail" dev=sda9 ino=2490369
scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023
tcontext=system_u:object_r:mail_spool_t:s0 tclass=file 
node=troodos.org.uk type=SYSCALL msg=audit(1250303201.472:2436):
arch=40000003 syscall=196 success=yes exit=0 a0=8a7d598 a1=bfe1faa4
a2=77cff4 a3=1 items=0 ppid=15098 pid=15100 auid=0 uid=0 gid=0 euid=0
suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=513 comm="logrotate"
exe="/usr/sbin/logrotate"
subj=system_u:system_r:logrotate_t:s0-s0:c0.c1023 key=(null) 


Attachment: signature.asc
Description: This is a digitally signed message part

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux